Detailed analysis of security vulnerabilities
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.